International Journal Software Engineering and Computer Science (IJSECS) https://journal.lembagakita.org/index.php/ijsecs <div class="journal-description mb-4"><header> <p><strong>International Journal Software Engineering and Computer Science (IJSECS)</strong>, e-ISSN: <a href="https://issn.brin.go.id/terbit/detail/20210418032364208" target="_blank" rel="noopener">2776-3242</a> and p-ISSN: <a href="https://issn.brin.go.id/terbit/detail/20210421162353415" target="_blank" rel="noopener">2776-4869</a>, is a free and open-access journal published by the Lembaga Komunitas Informasi Teknologi Aceh (KITA), Indonesia. <strong>IJSECS</strong> is a peer-reviewed, twice-annually published international journal that focuses on innovative, original, previously unpublished, experimental, or theoretical research concepts. IJSECS is committed to bridging the theory and practice of information technology and computer science. From innovative ideas to specific algorithms and full system implementations, IJSECS publishes original, peer-reviewed, and high-quality articles in the areas of information technology and computer science. IJSECS is a well-indexed scholarly journal and is indispensable reading and reference for people working at the cutting edge of information technology and computer science applications. All published article URLs will have a digital object identifier (DOI).</p> <p> To submit your article to International Journal Software Engineering and Computer Science (IJSECS)<strong> </strong>;</p> <ul> <li class="show">You have to <a class="label label-info" href="http://journal.lembagakita.org/index.php/ijsecs/user/register">Register</a> or <a class="label label-success" href="http://journal.lembagakita.org/index.php/ijsecs/login">Login</a> to submit your or.</li> <li class="show">You can access the manuscript format from the author guidelines.</li> <li class="show">Download <a class="label label-warning" href="https://drive.google.com/file/d/1qnxvhIzW4aHmSWUw4VKzHLpTnBFJ9tcN/" target="_blank" rel="noopener">Template (English)</a></li> </ul> </header></div> en-US ijsecs@lembagakita.org (Muhammad Wali) safrizal@ar-raniry.ac.id (Safrizal) Thu, 01 Aug 2024 00:00:00 +0700 OJS 3.3.0.17 http://blogs.law.harvard.edu/tech/rss 60 Implementation of a Web-Based Village Information System Using the Waterfall Method in Hegarmukti Village https://journal.lembagakita.org/index.php/ijsecs/article/view/2986 <p>The dissemination of information at the village level is crucial for ensuring transparency to the residents. To facilitate the quick and easy communication of such information, a web-based village information system was developed. This system can be accessed by all community members, both within and outside the village, as long as they have an internet connection. Currently, Hegarmukti Village does not have an effective web-based information system, leading to delays in information delivery and a lack of accuracy. Moreover, the potential of the village remains under-promoted. This study aims to design and implement a web-based village information system for Hegarmukti Village using the Waterfall method. The system is developed using HTML for programming and MySQL for the database, with the goal of enhancing transparency and the efficiency of information dissemination. The system provides features such as village profiles, news updates, and population data searches, improving the accessibility and reliability of village information.</p> Febby Ferdiansyah, Abdul Halim Anshor, Edy Widodo Copyright (c) 2024 Febby Ferdiansyah, Abdul Halim Anshor, Edy Widodo https://creativecommons.org/licenses/by-nc-nd/4.0/ https://journal.lembagakita.org/index.php/ijsecs/article/view/2986 Thu, 01 Aug 2024 00:00:00 +0700 Implementation of Digital Signatures in the Integrated Patient Progress Notes System at XYZ Hospital Bandung https://journal.lembagakita.org/index.php/ijsecs/article/view/2936 <p>This study aims to implement a digital signature system for filling out Integrated Patient Progress Notes (CPPT) using QR-Code technology. The research method employed is the waterfall development model. The stages of the study include requirements analysis, data collection from various sources, system design, implementation according to the design, testing, and reporting. The study was conducted at XYZ Hospital in Bandung, where it was found that the CPPT signing process is still manually done using a pen, which is considered inefficient as it takes a long time for authorization and is prone to manipulation, thereby reducing the document's validity. The implementation of a digital signature aims to simplify the document signing process quickly without the need for printing, sending, or waiting for physical documents, allowing it to be done digitally and automatically, thereby increasing speed and efficiency. This system also provides authentication assurance by the rightful owner, ensures document security, reduces the risk of damage or loss, and minimizes the possibility of manipulation, thus providing convenience for staff and doctors in terms of time and data accuracy.</p> Tasya Saldira Putri Supriadi, Yuda Syahidin, Yuyun Yunengsih Copyright (c) 2024 Tasya Saldira Putri Supriadi, Yuda Syahidin, Yuyun Yunengsih https://creativecommons.org/licenses/by-nc-nd/4.0/ https://journal.lembagakita.org/index.php/ijsecs/article/view/2936 Fri, 30 Aug 2024 00:00:00 +0700 Implementation of a Web-Based Raw Material Inventory Information System Using the Prototype Method: A Case Study at PT. XYD https://journal.lembagakita.org/index.php/ijsecs/article/view/2926 <p>PT. XYD is a manufacturing company in the automotive industry and serves as a key vendor for the Wuling car brand, producing parts for models such as Confero, Cortez, Almaz, Air Ev, and Alvez. As production volume and the complexity of managing raw materials have increased, PT. XYD faces challenges in maintaining the accuracy of inventory data, particularly in the warehouse. Errors in data entry can disrupt the production process, leading to delays in product delivery to customers. To address this issue, this study developed and implemented a web-based raw material inventory information system using the prototype method. This method was chosen for its ability to accelerate the development process through iterative improvements based on user feedback. The system was designed using Unified Modeling Language (UML) to illustrate the system’s model and structure. The implementation of this system aims to enhance efficiency and accuracy in managing inventory data, ultimately minimizing the risk of errors, increasing productivity, and ensuring smooth company operations. The results of the study demonstrate that the system successfully facilitates the digitalization of ordering and inventory reporting processes, reducing reliance on manual processes and improving the speed and accuracy of data processing at PT. XYD.</p> Dede Agus Susanto, Andri Firmansyah, Ismasari Nawangsih Copyright (c) 2024 Dede Agus Susanto, Andri Firmansyah, Ismasari Nawangsih https://creativecommons.org/licenses/by-nc-nd/4.0/ https://journal.lembagakita.org/index.php/ijsecs/article/view/2926 Thu, 01 Aug 2024 00:00:00 +0700 Data Transfer Security in IoT Communication Based on Attribute-Based Cryptography https://journal.lembagakita.org/index.php/ijsecs/article/view/2887 <p>Due to the drastic growth, the Internet of Things (IoT) has become an inevitable form of human life. However, IoT communication is subjected to a vast range of security breaches in the vulnerable environment, which leads to the demand for appropriate technology security issues in IoT communication. The cryptography technique exhibits effective security characteristics that promise promising results for identifying security breaches in IoT. This paper proposes attribute-based elliptical curve cryptography (ATB_ECC) to improve security in IoT communication. IoT devices perform communication to overcome security issues in IoT based on defined attributes of access points. Attributes are involved in the characteristics of trusted nodes in the network. The cryptography technique utilizes Elliptical Curve Cryptography (ECC) to transmit messages securely in the IoT environment. Through integrating attribute factors and cryptography techniques, the IoT network can distinguish variations in the active data communication and threats in the IoT network. Simulation performance is examined for different critical structures, such as low, medium, and high. The proposed ATB_ECC is examined for attack prediction scenarios considering real-time servers. The examined results stated that the proposed ATB_ECC has effectively prevented attacks, especially brute force attacks. Analysis of results stated that low-key structure exhibits minimal complexity, but the security level is minimal. A high-key structure consumes vast energy and has increased complexity, but the security is significantly improved. The comparative analysis of various key structure results illustrated that the proposed attributes-based ECC exhibits improved performance at 15% for throughput.</p> Adel Abidullah, Khoshal Rahman Rahmani, Wali Mohammad Wadeed, Musawer Hakimi Copyright (c) 2024 Adel Abidullah, Khoshal Rahman Rahmani, Wali Muhammad Wadid, Musawer Hakimi https://creativecommons.org/licenses/by-nc-nd/4.0/ https://journal.lembagakita.org/index.php/ijsecs/article/view/2887 Thu, 01 Aug 2024 00:00:00 +0700 Sentiment Analysis of BMKG Weather Information Service Using K-Nearest Neighbor Method https://journal.lembagakita.org/index.php/ijsecs/article/view/2881 <p>The Meteorology, Climatology, and Geophysics Agency (BMKG) is a government institution that provides information related to air quality, climate, dry days, satellite imagery, wave forecasts, wind forecasts, and fire potential. This information is disseminated not only through BMKG's official website but also via the social media platform X, making it easier for the public to access up-to-date information. This study aims to classify user sentiment towards the weather information services provided by BMKG using the K-Nearest Neighbor (KNN) method. Data was collected through a web crawling technique, resulting in 1,031 data points analyzed in this research. The data processing stages included Pre-Processing and sentiment calculation using Vader's Sentiment and Random Forest. The classification results using the KNN algorithm showed an accuracy rate of 96%, with an average precision of 96%, an average recall of 96%, and an average f-measure of 96%. These findings indicate that the KNN model can effectively classify user sentiment towards BMKG's services.</p> Muhamad Fajar Sodiq, Fatkhul Amin Copyright (c) 2024 Muhamad Fajar Sodiq, Fatkhul Amin https://creativecommons.org/licenses/by-nc-nd/4.0/ https://journal.lembagakita.org/index.php/ijsecs/article/view/2881 Fri, 30 Aug 2024 00:00:00 +0700